mgt330 week 5 1

Explain why the four steps involved in the control function are important. How are the various ratios used by accountants and managers differently in the control function? Support your claims with specific examples from required materials and/or other scholarly resources, and properly cite any references. Your initial post should be a minimum of 200 words.

anatomical paper

Pick a topic or ask a question but you don’t know the answer to and you will want a topic that after researching it can be applied in engineering field.

4 page paper 17

To prepare:

  • Review the Aravind case study in the Learning Resources.
  • With the 5 I’s of marketing in mind, reflect on the health care service provided by the organization and its personnel.

The Assignment

In a 4- to 5-page paper, address the following:

  • Using the 5 I’s of marketing, analyze the health care service provided by the organization in the scenario.
    • Inconsistency: Is there consistency in the quality of care?
    • Inseparability: When providing the service, do providers demonstrate biases toward or against patients and their families (i.e., racial biases, age biases, gender biases, etc.)?
    • Intangibility: What are the intangible characteristics of providers (i.e., demeanor, posture, etc.)? How do providers behave toward patients?
    • Interaction with consumers: Is the organization patient-centered or physician-centered?
    • Inventory: How much time is spent on providing the service and how much time is spent on non-service-related activities?
  • Recommend strategies to market this service to health care consumers. Include how these strategies might improve operations.

policy paper 13

three- to five-page (800–1,200-word) security policy write-up for the antivirus, spyware, and adware policies for a medium-sized organization. Be sure to suggest security tools, and set up a schedule for maintaining a company that is free of infestations of malware.

sme paper

Submit a 2,500 to 3,000 word –plus references-written assignment on the following:

Draw on a real-life public or non-profit human resource issue that is currently in the news, and assume that as a result of your research you have become the subject matter expert (SME) for this HR topic. Good sources for this can be FedSmith.com, Governing.com, SHRM.org, hrmorning.com, HR.BLR.com, ipma@ipma-hr.org; etc., Feel free to use the popular media as well. ( minimum of five articles) . Please do not use wikis, blogs, politically motivated websites or dictionaries as sources. In addition, you can use books, websites (Federal OPM, OHR), or BLS might be good to review as well as individual state HR sites) or any other authentic sources. You may augment the popular literature review with additional peer reviewed journal articles.

1. Build your literature review on the real-life news topic you chose to explore by researching relevant issues.

As you read, make note of the following:

• Identify the author’s thesis. What is she arguing for/against? Identify the context of the argument.

• Why is he/she arguing this? Do they offer a solution to the problem(s) they raise?

• Does it seem plausible?

• Note any supporting evidence and all of the main ideas. How does the author support his/ her argument? What kind of appeals does the author make in order to persuade the reader? For example, does he/she use: pathos (appeal to emotion), logos (appeal to reason/logic), &/or ethos (appeal to credibility)

Your submission should include the following:

1. Summarize the key points of news articles and emphasize its relevance to public and nonprofit HR management. In addition, make connections to your readings and other assignments.

2. Provide a critical analysis of the arguments (for and against) made in the popular articles. Make sure to support your analysis with arguments from the course and any scholarly articles you wish to consult

3. Suggest what the future will bring for the issue you have researched.

Excessive wordiness or brevity will negatively affect your grade.

Use the style guide for the American Psychological Association (APA) for proper form.

judiciary short essay assignment 2

  1. Drawing on the material presented in your Open to Debatee-text and the corresponding power point lecture outlines and lectures or video lecture clips, explain, why judges, who are not popularly elected, have such wide authority to strike down popular laws; why do judges have such enormous power with so little public accountability? Why does the U.S. have such an undemocratic institution in its democracy?
  2. Drawing on Saffell, Meese, and Brennan in ch. 13 of your American Government: Examinedreader (you may also find the material presented in the Judiciary chapter of your Open to Debate e-text and the corresponding power point lecture outline and lectures or video lecture clips to be helpful), do you think Justices should act according to the dictums of judicial activism or judicial restraint? You will want to include direct references to Meese and Brennan in your response.
  3. Pretend you are a Supreme Court Justice who must render a decision in the three LGBT cases currently before the Supreme Court: Altitude Express v. Zarda, Bostock v. Clayton County, and Harris Funeral Home v. EEOC. I want you to act as a S.C. Justice and, drawing on what you have already in this assignment, the U.S. Constitution, and other relevant course materials, render a decision. How would you rule? Why? On what are you basing your decision? Which parts of the Constitution or other documents are relevant? Remember you are acting as a justice, not simply expressing your personal opinions. 5pgs

Here is a link to the U.S. Supreme Court website:
http://www.supremecourt.gov, you can find many other resources online.

Tips for Success:

– I will be looking for direct references to assigned readings (author and page # citations are adequate). Please limit yourself to the assigned materials.

– More thoughtful analyses utilizing critical thought will earn higher scores.

final project 298

In this assignment, you will demonstrate your mastery of the following course outcomes:  Analyze a business organization for determining the business requirements related to information technology systems  Articulate the role and function of information systems in business organizations for how they impact business operations  Recommend appropriate information technology options for effectively supporting business operations  Recommend basic security considerations related to business information systems for effectively securing company data Prompt Imagine that you work for the small brick-and-mortar business described in the final project case scenario. The owner of your business wants to focus on generating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain an understanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearly introduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirements that any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine 2 whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets the needs of your business, including what your business owner must consider in regard to security and privacy of company data. Select two of the following technologies to focus on in your business systems analysis paper:  Big data and knowledge management  Wireless, mobile computing, and mobile commerce  Social computing  Cloud computing  Business analytics and business intelligence solutions  Intelligent systems Specifically, the following critical elements must be addressed: I. Introduction: In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve. A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to do. B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis. II. Business Requirements: In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteria that will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating new technology. A. Explain the objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and how does it support the goal of your business? B. Provide a project description that explains the purpose of the project. Be sure to address the following: i. What does your business need to do to satisfy the objectives? ii. What are the desired results at the end of the project? iii. Why is it important for your business owner to consider implementing new technology? C. State the key technological requirements that will be required of any new technology in order to effectively solve your business’s problem. In other words, what specifically does the technology need to be capable of doing? (These are the technology requirements in the decision matrix.) 3 III. Competitors and Technology: In this section, you will describe two competing companies that operate in the same industry as your business. You will also explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for your business to use. Remember that a list of competing companies was provided to you in the final project case scenario. A. Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples. B. Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples. C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting from technology, and describe the potential benefit to your business if you were to adopt the same approach. IV. Technology Solutions: In this section, you will discuss how each of the two technologies meets the technology requirements that you identified in section II. Use your decision matrix to guide your responses. A. Technology One: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology requirements the technology meets, and where there are gaps. B. Technology Two: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology requirements the technology meets, and where there are gaps. V. Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on how well each technology meets your business’s technology requirements. A. Recommend a technology solution for your business, and defend why that solution is appropriate. You may recommend only one technology or any combination of the two that you investigated. B. Explain the overall benefit of your recommended technology solution to your business. Consider the following: C. How will it will it enhance efficiency? i. How will it position your business for future growth as you move online? VI. Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if they choose to adopt your recommendations. A. Explain the security features your recommended technology solution should have. B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed technology. C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide examples.

THIS WILL REQUIRED THE TUTOR ADD THE FEEDBACK FROM PROJECT 1 AND 2 INTO THIS FINAL PROJECT. THESE FEEDBACK WILL PROVIDED.

research paper topic information systems security governance research a behavioral perspective please find the instructions below

RESEARCH PAPER TOPIC: Information Systems Security Governance Research: a behavioral perspective.


Final Research Paper: The course research paper is a formatted APA paper. It is 12-14 pages, double-spaced . Paper length requirement is 12-14 pages of content, or approximately 3500 words. The title page and reference page(s) s are not part of this total There should be at least 7 credible sources to support your work.

The Final papers will contain a title page, abstract, introduction/topic paragraph, summary/conclusion, and reference page. A sample of this format is provided in the Additional Course Resources folder provided in the attached APA Template paper.

hhd 2990 r7 8 11 western civilization i reading the following materials and writing a detailed summary

This project involves reading the following materials and writing a detailed summary which addresses the associated questions. The readings are available in the Google Drive folder (“Project-Readings.pdf”). If you have a particular source or topic you wish to pursue, please feel free to talk to me about it one day after class.

Our textbook leaves out so much material, particularly detail about social life in the early modern period. This project will address some of these topics.

First Reading: From Natalie Zemon Davis, Society and Culture in Early Modern France (Stanford, CA: Stanford University Press, 1975).

Social rituals were a big part of life in the past because they helped to knit together many aspects of life, and even social classes. They also served to settle social tensions that arose. This reading discusses some of these phenomena.

Your particular assignment is to write a fairly detailed summary of the material and, within it, address the following questions. Please cite specific evidence from the reading.

Some guiding questions:
1. In what ways were different age groups involved in the rituals of “misrule”? 2. What social problems did the Abbeys of Misrule tend to solve?
3. How were different social classes part of these rituals?

Second Reading: From Merry E. Wiesner, Women and Gender in Early Modern Europe (New York: Cambridge University Press, 2008).

The history of women has become a huge topic within the academy. This reading deals with the most basic aspect of a woman’s life, her biology and how it related to social customs and expectations in the early modern period.

Your particular assignment is to write a fairly detailed summary of the material and, within it, address the following questions. Please cite specific evidence from the reading.

Some guiding questions:
1. What were the “stages” in a woman’s life, and how are they described? 2. In what ways was sexuality important?
3. Were women ever seen as a threat to men?
4. Did any women rebel against the cultural constraints of their culture?

There is no particular length requirement, but to do a rigorous job I would say that the minimum altogether would be at least between four to six pages, if typed and double-spaced.

create fundamental programs using concepts such as declaring and initializing variables and constants

INSTRUCTIONS: First complete the discussion topic using a minimum of 100 words and then complete the assignment as directed. The assignment rubric is attached.



IT213: Software Development

Discussion Topic: Using Data and Embracing Failure

  • How do you use the concepts of variables and constants in performing some of your routine tasks? For example, when doing laundry, are there constants and variables involved? Think of a task that you perform routinely to answer this topic.
  • Please go to https://www.youtube.com/watch?v=nF-5CMozGWY and listen to Kevin Kelly on What Technology Wants. Discuss your thoughts on what Kevin Kelly states in this video. What do you agree with, and what might you disagree with? How does what he discusses about embracing failure relate to programming, in your opinion.



Assignment Instructions

In this assignment you will complete a program to demonstrate the skills presented in this lesson for your selected language path. Please keep in mind that with all the assignments in this course, any given scenarios are hypothetical and intended solely to demonstrate specific skills.

Note: If your language of choice is Web Development, you will need to complete the exercises in both PHP and JavaScript.

Using the language in which you have chosen to focus: C#, Java, Web Development languages (PHP and JavaScript), please complete the following assignment:

In this hypothetical scenario, you will create a program that will allow a student to register for certification classes in HVAC. The school offers a $150 discount if the student signs up for twenty or more unit-hours. Students may also pay the tuition costs over a twelve-month period.

Assignment Requirements

  1. Your program should declare variables using the appropriate data types to store the following string values.

Name: “John Smith”

Address: “101 N. Main Street”

City: “AnyTown”

State: “TX”

Zip: “11111”

Units Taken: “19”

  1. For the price per unit, declare a constant numeric variable to contain the decimal value 100.50.
  1. For the twenty unit-hour discount, declare a constant numeric variable to contain the whole number 150.
  1. Convert the string value for Units Taken to an integer data type and place the converted numeric value into a separate numeric variable.

Hint: Use the same name but add the prefix ‘int’ such as intUnitsTaken.

  1. Using the increment operator, increment the variable above by 1 so that the value 19 will now be 20.
  1. Multiply the constant variable for price per unit by the units taken and place the answer in a variable named tuition.
  1. Subtract the constant discount value from tuition and store the answer in a variable named afterDiscount.
  1. Divide the discounted tuition by 12 and store the answer in a variable named monthlyPayment.
  1. Finally, your program will display the following data using the respective variables for each item:

Name

Address

City

State

Zip Code

Number of units taken (numeric value that was incremented)

Tuition before discount

Tuition after discount

Monthly Payment

Include labels for each item as shown in expected output. Format the tuition

values and monthly payment as currency.

EXPECTED OUTPUT

Name: John Smith

Address: 101 N. Main Street

City: Anytown

State: TX

Zip Code: 11111

The number of units taken is: 20

The tuition before discount is $2,010.00

The tuition after twenty-unit discount is $1,860.00

Your monthly payment is $155.00

Directions for Submitting Your Assignment

The source code file is the file in your project that contains the code you wrote. You will only need to submit the source code file for your program and not the entire project folder or any additional project files. Below are listed the file extensions for the source code file for each language:

.cs file for C#

.java file for Java

.php and.js files for web development